IBM I 7.1 Certified Academic Associate

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rafasol
R
Rafasol
Community Contributor
Quizzes Created: 3 | Total Attempts: 546
Questions: 41 | Attempts: 267

SettingsSettingsSettings
IBM Certification Quizzes & Trivia

Test 000-120: Academic Associate: IBM i 7 Administration Test information:
Number of questions: 41 Time allowed in minutes: 60 Required passing score: 56% Test languages: English Objetives
Work Management (27%) System Security (27%) Backup & Recovery (12%) PTF Management (5%) Daily Tasks (29%)
This certification replaces to IBM i 6.1 Basic Operations


Questions and Answers
  • 1. 

    What is the purpose of the Max Active parameter when creating or modifying a memory' pool?

    • A.

      It limits how many jobs can run concurrently.

    • B.

      It limits the number of users which can access that memory.

    • C.

      It limits the number of threads which can process concurrently.

    • D.

      It limits cache availability for the subsystems assigned to the pool.

    Correct Answer
    C. It limits the number of threads which can process concurrently.
    Explanation
    The purpose of the Max Active parameter when creating or modifying a memory pool is to limit the number of threads that can process concurrently. This parameter sets a maximum limit on the number of threads that can be active at any given time within the memory pool. By setting this limit, it helps to manage and control the resource allocation and usage within the pool, ensuring that the system does not become overwhelmed with too many concurrent threads.

    Rate this question:

  • 2. 

    An IBM i programmer requires access to data stored in a file located on a Windows server. Which filesystem can the programmer use to access this data?

    • A.

      QDLS

    • B.

      QNTC

    • C.

      QOpenSys

    • D.

      QFileSvr.400

    Correct Answer
    B. QNTC
    Explanation
    The programmer can use the QNTC (QSYS Network File System) filesystem to access the data stored in a file located on a Windows server. QNTC allows IBM i systems to access files and directories on remote systems, including Windows servers, using the SMB (Server Message Block) protocol. This enables the programmer to read, write, and manipulate the data stored in the file on the Windows server directly from their IBM i system.

    Rate this question:

  • 3. 

    Which list contains only objects that can affect the amount of memory available to a job?

    • A.

      Job description, Subsystem description, Routing program.

    • B.

      Job description, Class description. Shared Pool memory pool description.

    • C.

      Job description, Subsystem description, Shared Pool memory pool description.

    • D.

      Class description, Subsystem description, Shared Pool memory pool description.

    Correct Answer
    C. Job description, Subsystem description, Shared Pool memory pool description.
    Explanation
    The correct answer is Job description, Subsystem description, Shared Pool memory pool description. These three objects can directly affect the amount of memory available to a job. The job description defines the attributes and parameters of a job, including memory allocation. The subsystem description specifies the characteristics and resources available to a subsystem, including memory allocation. The shared pool memory pool description defines the memory allocation and management for the shared pool, which is a common area of memory used by multiple jobs and subsystems. The other options either do not directly affect memory allocation or are not relevant to the question.

    Rate this question:

  • 4. 

    Which command provides a listing of currently active subsystems?

    • A.

      WRKSBS

    • B.

      WRKSBSD

    • C.

      WRKUSRJOB

    • D.

      WRKSYSACT

    Correct Answer
    A. WRKSBS
    Explanation
    The command "WRKSBS" provides a listing of currently active subsystems. This command allows users to view the status and details of each active subsystem in the system. It provides information such as the subsystem name, status, job count, and job queue associated with each subsystem. This command is useful for system administrators and operators to monitor and manage the active subsystems in the system.

    Rate this question:

  • 5. 

    What is the purpose of System Managed Access Path Protection (SMAPP)?

    • A.

      To prevent excessive I/O queuing when updating access paths.

    • B.

      To automatically save file access data for security auditing

    • C.

      To improve application run time by providing a 'short cut' to data

    • D.

      To reduce recovery time by journaling changes in access path size and location

    Correct Answer
    D. To reduce recovery time by journaling changes in access path size and location
    Explanation
    SMAPP, or System Managed Access Path Protection, helps reduce recovery time by journaling changes in access path size and location. This means that if there is a failure or system crash, SMAPP can quickly restore the access paths to their previous state, saving time and effort in recovery. By journaling these changes, SMAPP ensures that the access paths can be easily reconstructed, minimizing downtime and improving system availability.

    Rate this question:

  • 6. 

    An administrator restores a set of two libraries named TEST_A and TEST_B from a backup tape. Several objects did not restore into library TEST_A . All objects restored into library TEST_B . The administrator reviews the job log and finds that all of the objects that failed to restore were logical files. What is the most likely reason that these objects failed to restore?

    • A.

      The logical files were saved with the ACCPTH (*NO) parameter.

    • B.

      The ALWOBJDIF (*ALL) parameter was not specified on the RSTLIB command.

    • C.

      The logical files are based on physical files that are in library TEST_B.

    • D.

      The administrator does not have sufficient authority to restore the access paths.

    Correct Answer
    C. The logical files are based on physical files that are in library TEST_B.
    Explanation
    The most likely reason that the objects failed to restore is that the logical files are based on physical files that are in library TEST_B. Since the logical files are dependent on the physical files, if the physical files were not restored or were restored in a different library, the logical files would not be able to restore properly into library TEST_A.

    Rate this question:

  • 7. 

    Which console is required to support virtualization (LPAR) on a Power 740 system?

    • A.

      HMC.

    • B.

      Twinax.

    • C.

      Operations Console LAN Attach.

    • D.

      Operations Console Direct (serial) Attach.

    Correct Answer
    A. HMC.
    Explanation
    The correct answer is HMC. The HMC (Hardware Management Console) is required to support virtualization (LPAR) on a Power 740 system. The HMC is a separate hardware device that provides management and configuration capabilities for IBM Power Systems servers. It allows administrators to create, configure, and manage logical partitions (LPARs) on the Power 740 system, enabling virtualization and resource allocation. The HMC provides a graphical user interface (GUI) and command line interface (CLI) for managing the system, making it an essential component for virtualization on the Power 740 system.

    Rate this question:

  • 8. 

    After reviewing various items in the system audit journal using the DSPAUDJRNE command, the administrator would like to use the DSPJRN command to output more information. What needs to be specified for the journal in the DSPJRN command in order to output data from the system audit journal?

    • A.

      Library QSYS, journal QAUDJRN.

    • B.

      Library *LIBL, journal QAUDRCV01.

    • C.

      Library *AUDLIB, journal QAUDCTL.

    • D.

      Library QUSRWRK, journal QAUDLVL2.

    Correct Answer
    A. Library QSYS, journal QAUDJRN.
    Explanation
    The correct answer is Library QSYS, journal QAUDJRN. In order to output data from the system audit journal using the DSPJRN command, the administrator needs to specify the library QSYS and the journal QAUDJRN.

    Rate this question:

  • 9. 

    What is the purpose of a job description?

    • A.

      To define where and how a job runs.

    • B.

      To assign memory resources to a job.

    • C.

      To specify the job purge level and subsystem.

    • D.

      To provide a logical way to identify various jobs.

    Correct Answer
    A. To define where and how a job runs.
    Explanation
    A job description is used to define the location and manner in which a job operates. It outlines the responsibilities, tasks, and requirements of a particular job, providing a clear understanding of what is expected from an employee in that role. It helps both the employer and the employee to have a shared understanding of the job's scope, responsibilities, and performance expectations. A well-defined job description also aids in the recruitment and selection process by attracting suitable candidates who possess the necessary skills and qualifications for the job.

    Rate this question:

  • 10. 

    What resources are needed for a hosted partition to be successfully created and started?

    • A.

      Network server description, Virtual SCSI adapter, Virtual serial adapter.

    • B.

      Network server storage space, Virtual SCSI adapter, Virtual serial adapter.

    • C.

      Network server description, Network server storage space, Virtual SCSI adapter.

    • D.

      Network server description, Network server storage space, Virtual serial adapter.

    Correct Answer
    C. Network server description, Network server storage space, Virtual SCSI adapter.
    Explanation
    The correct answer is network server description, network server storage space, and virtual SCSI adapter. These resources are necessary for a hosted partition to be successfully created and started. The network server description provides information about the server, the network server storage space is required to store the partition's data, and the virtual SCSI adapter allows the partition to connect to storage devices. The virtual serial adapter is not mentioned as a requirement for creating and starting a hosted partition.

    Rate this question:

  • 11. 

    A daily job produces a large a number of spooled files. The administrator has changed the print file attributes to cause the print files to expire. The administrator has noticed that even though spooled files are expired, they are not being removed from the system. What additional step must be taken to cause these spooled files to be removed from the system?

    • A.

      The system value QEXPSPLF must be set to "REMOVE.

    • B.

      The print files *EXPACTION parameter must be set to *REMOVE.

    • C.

      The Reclaim Spooled Storage (RCLSPLSTG) command must be run.

    • D.

      The command DLTEXPSPLF must be run to remove the spool files.

    Correct Answer
    D. The command DLTEXPSPLF must be run to remove the spool files.
  • 12. 

    A programmer is developing an application that has several file objects. One of the objects is a control file that will not be updated by the users. What is the correct permission for the control file to prevent updates by users?

    • A.

      *USE

    • B.

      *CHANGE

    • C.

      *OBJREF

    • D.

      *OBJALTER

    Correct Answer
    A. *USE
    Explanation
    To prevent users from updating the control file, the correct permission is to set it to *USE. This permission allows users to only access and read the file, but they cannot make any changes or updates to it. By setting the permission to *USE, the programmer ensures that the control file remains secure and its integrity is maintained, as it is not susceptible to accidental or unauthorized modifications.

    Rate this question:

  • 13. 

    A user is attempting to connect to a system by using IBM i Access 5250 emulation. The user receives the message "Virtual Device Cannot is selected." What should the administrator do to resolve the problem?

    • A.

      Change the value of the system value QVRTDEV to *YES.

    • B.

      Change the value of the system value AUTOCFG to *YES.

    • C.

      Change the value of the system value QAUTODEV to *ALL.

    • D.

      Change the value of the system value QAUTOVRT to *NOMAX.

    Correct Answer
    D. Change the value of the system value QAUTOVRT to *NOMAX.
    Explanation
    The correct answer is to change the value of the system value QAUTOVRT to *NOMAX. This will resolve the problem of the user receiving the message "Virtual Device Cannot is selected." By changing the value to *NOMAX, it ensures that there is no maximum limit set for the automatic virtual device creation on the system. This allows the user to successfully connect to the system using IBM i Access 5250 emulation without any issues.

    Rate this question:

  • 14. 

    Which special authority allows user to add, change, and delete user profiles?

    • A.

      *AUDIT

    • B.

      *SECADM

    • C.

      *ALLOBJ

    • D.

      *SERVICE

    Correct Answer
    B. *SECADM
    Explanation
    The special authority that allows a user to add, change, and delete user profiles is SECADM. This authority grants the user the ability to manage security on the system, including the ability to create, modify, and delete user profiles. The other options, AUDIT, ALLOBJ, and SERVICE, do not have the necessary privileges to perform these actions.

    Rate this question:

  • 15. 

    A long running batch job ends unexpectedly. This generates thousands of pages of job log output. The job log includes thousands of informational messages and ends with: "Job message queue cannot be extended." What can the administrator do to prevent the job from ending when this problem occurs?

    • A.

      Change system value QJOBMSGQMX to the highest allowed value of 64.

    • B.

      Change the job so that its output is generated by a Job Log Server.

    • C.

      Change the system value QJOBMSGQFL to *EXTEND enabling automatic job log extension

    • D.

      Change the job's logging level so that informational messages do not appear in the job log.

    Correct Answer
    D. Change the job's logging level so that informational messages do not appear in the job log.
    Explanation
    Changing the job's logging level so that informational messages do not appear in the job log will prevent the job from ending when the problem of the job message queue not being extended occurs. This is because the job will not generate the thousands of informational messages that cause the job log to exceed its limit and end unexpectedly. By excluding these messages, the job can continue running without interruption.

    Rate this question:

  • 16. 

    What system value, when properly set, will allow a single-partition system to come up automatically after an electrical outage?

    • A.

      QIPLSTS

    • B.

      QRMTIPL

    • C.

      QIPLTYPE

    • D.

      QPWRRSTIPL

    Correct Answer
    D. QPWRRSTIPL
    Explanation
    The correct answer is QPWRRSTIPL. This system value, when properly set, allows a single-partition system to come up automatically after an electrical outage. It is responsible for initiating a power restart of the system, ensuring that it can recover and resume operation without manual intervention.

    Rate this question:

  • 17. 

    Which set of object authorities will enable users to run a program object and update data used by the program?

    • A.

      *USE for the program objects and *CHANGE for the data files.

    • B.

      *EXECUTE for the program objects and *CHANGE for the data files.

    • C.

      *OBJEXIST for the program objects and *UPDATE for the data files.

    • D.

      *USE for the program objects and *DELETE "UPDATE for the data files.

    Correct Answer
    A. *USE for the program objects and *CHANGE for the data files.
    Explanation
    The set of object authorities that will enable users to run a program object and update data used by the program is *USE for the program objects and *CHANGE for the data files. This means that users will have permission to access and execute the program objects, as well as modify the data files that are being used by the program.

    Rate this question:

  • 18. 

    Which command(s) will change the QBATCH subsystem to process 10 jobs at the same time?

    • A.

      CHGSBSD SBSD(QSYS/QBATCH) MAXJOBS(10)

    • B.

      CHGSBSD SBSD(QSYS/QBATCH) SEQNBR(10)

    • C.

      CHGSBSD SBSD(QSYS/QBATCH) MAXJOBS(10) RESTART(*IMMED)

    • D.

      CHGSBSD SBSD(QSYS/QBATCH) JOBS(10) ENDSBS SBS(QSYS/QBATCH) OPTION(*IMMED) RESTART(*YES)

    Correct Answer
    A. CHGSBSD SBSD(QSYS/QBATCH) MAXJOBS(10)
    Explanation
    The correct answer is CHGSBSD SBSD(QSYS/QBATCH) MAXJOBS(10). This command will change the QBATCH subsystem to process 10 jobs at the same time by setting the maximum number of jobs (MAXJOBS) to 10.

    Rate this question:

  • 19. 

    An administrator is analyzing job queue QBATCHJOB. There are jobs waiting to run. The job queue is single threaded. Which is the first criterion used to determine how and when a job in the QBATCHJOB queue is processed?

    • A.

      The time and date the jobs were submitted.

    • B.

      The authority of the user submitting the jobs.

    • C.

      The system values assigned for job queue processing.

    • D.

      The priority of the jobs as given by the job description assigned.

    Correct Answer
    D. The priority of the jobs as given by the job description assigned.
    Explanation
    The first criterion used to determine how and when a job in the QBATCHJOB queue is processed is the priority of the jobs as given by the job description assigned. This means that jobs with higher priority will be processed before jobs with lower priority. The time and date the jobs were submitted, the authority of the user submitting the jobs, and the system values assigned for job queue processing may also play a role in determining the order of job processing, but the priority of the jobs is the primary criterion.

    Rate this question:

  • 20. 

    What is an advantage of using an authorization list instead of a group profile?

    • A.

      Authorization lists override individual object authority.

    • B.

      An object can be authorized by many authorization lists, but only one group profile.

    • C.

      Authorization lists provide *ALLOBJ access to both objects and programs used to update.

    • D.

      Authorization lists allow different users to have individual authorities to the secured objects.

    Correct Answer
    D. Authorization lists allow different users to have individual authorities to the secured objects.
    Explanation
    Using an authorization list allows different users to have individual authorities to the secured objects. This means that each user can be granted specific permissions or restrictions on the objects, providing a more granular level of control over access. In contrast, a group profile applies the same set of authorities to all users within the group, limiting the ability to customize permissions for individual users. Therefore, using authorization lists provides more flexibility and security in managing access to secured objects.

    Rate this question:

  • 21. 

    Which system value limits the reuse of old passwords?

    • A.

      QPWDRULES

    • B.

      QPWDRQDDIF

    • C.

      QPWDCHGBLK

    • D.

      QPWDLMTREP

    Correct Answer
    B. QPWDRQDDIF
    Explanation
    The correct answer is QPWDRQDDIF. This system value limits the reuse of old passwords. It ensures that users cannot reuse their previous passwords, promoting better security practices. By enforcing the use of new passwords each time, it reduces the risk of unauthorized access to accounts.

    Rate this question:

  • 22. 

    When a program is called using an unqualified call, in what order is the job's library list searched for the program? Example: CALL PAYROLL instead of CALL PAYLIB/PAYROLL

    • A.

      Current library, User libraries and System libraries.

    • B.

      User libraries, Current library and System libraries.

    • C.

      System Libraries, User libraries and Current library.

    • D.

      System Libraries, Current library and User libraries.

    Correct Answer
    D. System Libraries, Current library and User libraries.
    Explanation
    When a program is called using an unqualified call, the job's library list is searched in the following order: first, the system libraries are searched, then the current library is searched, and finally, the user libraries are searched. This means that the system libraries are given the highest priority in the search, followed by the current library, and then the user libraries.

    Rate this question:

  • 23. 

    An administrator has been asked to provide a report on the performance-based system values. What function will provide all the required information?

    • A.

      The WRKSYSVAL command for the type of *PERF and specifying *PRINT for output.

    • B.

      The system values performance category in IBM Systems Director Navigator for i.

    • C.

      The performance task under IBM i Management in IBM Systems Director Navigator for i.

    • D.

      The system values category under Management Central endpoint systems inventory collection.

    Correct Answer
    B. The system values performance category in IBM Systems Director Navigator for i.
    Explanation
    The correct answer is the system values performance category in IBM Systems Director Navigator for i. This option is the most relevant because it specifically mentions the performance category in IBM Systems Director Navigator for i, which is likely to provide the required information on performance-based system values. The other options do not directly mention system values or performance-based information.

    Rate this question:

  • 24. 

    Programmers are having issues with the RPG compiler, and it has been determined that a fix must be ordered. Which type of PTF is most appropriate?

    • A.

      Fix groups.

    • B.

      Service packs.

    • C.

      Individual fixes.

    • D.

      Cumulative PTF packages.

    Correct Answer
    C. Individual fixes.
    Explanation
    When programmers are experiencing issues with the RPG compiler, the most appropriate type of PTF (Program Temporary Fix) to order would be individual fixes. Individual fixes are specific patches or updates that address specific problems or bugs in a software program. In this case, since the issue is with the RPG compiler, ordering individual fixes will allow the programmers to target and resolve the specific problems they are facing. Fix groups, service packs, and cumulative PTF packages are more general and may not specifically address the issues with the RPG compiler.

    Rate this question:

  • 25. 

    A user has forgotten their password and asked the administrator to reset it. Company security policy requires passwords to be known only to the user. The administrator used System i Navigator to access the Igor user profile. After checking "User must change password at next sign-on", what must the administrator do to reset the password?

    • A.

      Type a new password in the password box.

    • B.

      Select "Personal" and click "Reset user password."

    • C.

      Select "Capabilities" and click "Reset to Previous Password."

    • D.

      Drop down the password list, and select "Reset password to default."

    Correct Answer
    A. Type a new password in the password box.
    Explanation
    The administrator must type a new password in the password box to reset the password.

    Rate this question:

  • 26. 

    Why is Network Address Translation (NAT) a benefit to corporations?

    • A.

      It converts MAC addresses to IP addresses.

    • B.

      It allows corporations to hide private addresses from the public.

    • C.

      It links specific portions of an internal network with corporate cost centers.

    • D.

      It enables protocol conversion between network entities such as SANs and application servers.

    Correct Answer
    B. It allows corporations to hide private addresses from the public.
    Explanation
    NAT is a benefit to corporations because it allows them to hide their private addresses from the public. This means that when devices from the internal network access the internet, their private IP addresses are translated to a public IP address. This provides an added layer of security as it prevents direct communication between external entities and internal devices, making it harder for attackers to target the internal network. Additionally, NAT conserves IP addresses as multiple devices can share a single public IP address.

    Rate this question:

  • 27. 

    What command is used to save IFS objects?

    • A.

      SAV

    • B.

      SAVLIB

    • C.

      SAVOBJ

    • D.

      SAVDLO

    Correct Answer
    A. SAV
    Explanation
    The command used to save IFS (Integrated File System) objects is SAV. This command allows the user to save IFS objects such as directories, files, and symbolic links to a save file. By using the SAV command, the user can create a backup of the IFS objects, which can be restored later if needed.

    Rate this question:

  • 28. 

    An administrator plans to use a single LPAR and Management Central to manage PTFs for other systems in the enterprise. What is the most important consideration when deciding the baseline?

    • A.

      All systems are the same OS level.

    • B.

      All systems are at the same PTFGRP level.

    • C.

      All systems are at the same test fix level.

    • D.

      All systems are at the same Cumulative level.

    Correct Answer
    A. All systems are the same OS level.
    Explanation
    When using a single LPAR and Management Central to manage PTFs for other systems, the most important consideration for deciding the baseline is that all systems are at the same OS level. This ensures that the PTFs being managed are compatible with all the systems in the enterprise, reducing the risk of compatibility issues or conflicts. Having all systems at the same OS level also allows for easier management and ensures consistency in terms of functionality and features across the enterprise.

    Rate this question:

  • 29. 

    An administrator needs to set the compare value on a job to cause the subsystem to run the job with a specific class. Which parameter should the administrator use?

    • A.

      RUNPTY

    • B.

      JOBPTY

    • C.

      RTGDTA

    • D.

      INLRTGGRP

    Correct Answer
    C. RTGDTA
    Explanation
    The administrator should use the RTGDTA parameter to set the compare value on a job and cause the subsystem to run the job with a specific class.

    Rate this question:

  • 30. 

    User HOK tries to login and received the message "User profile cannot sign on." What is the most likely cause for the error?

    • A.

      The user's profile has been deleted.

    • B.

      The user's profile has been disabled.

    • C.

      The QMAXSIGN system value is set to 1.

    • D.

      The QMAXSGNACN system value is set to 1.

    Correct Answer
    B. The user's profile has been disabled.
    Explanation
    The most likely cause for the error is that the user's profile has been disabled. This means that the user is not allowed to sign on and access the system. It is possible that the user's profile was intentionally disabled by an administrator or there may be some security settings that have caused the profile to be disabled. Either way, the user will need to contact the system administrator to have their profile re-enabled in order to login successfully.

    Rate this question:

  • 31. 

    Which command will always find the IBM QCMD program?

    • A.

      WRKOBJ OBJ(*LIBL/QCMD) OBJTYPE(*PGM)

    • B.

      WRKOBJ OBJ(*CURLIB/QCMD) OBJTYPE(*PGM)

    • C.

      WRKOBJ OBJ(ALLUSR/QCMD) OBJTYPE(*PGM)

    • D.

      WRKOBJ OBJ(*USRLIBL/QCMD) OBJTYPE(*PGM)

    Correct Answer
    A. WRKOBJ OBJ(*LIBL/QCMD) OBJTYPE(*PGM)
    Explanation
    The correct answer is WRKOBJ OBJ(*LIBL/QCMD) OBJTYPE(*PGM). This command will search for the QCMD program in all libraries in the library list.

    Rate this question:

  • 32. 

    What are the correct data types for a CL variable?

    • A.

      A pointer value An integer value A cursor value A floating point value

    • B.

      A logical value A pointer value An integer value A packed decimal value

    • C.

      An integer value A logical value A floating point value An unsigned integer value

    • D.

      A decimal value A stacked pointer A logical value A variable length character string

    Correct Answer
    B. A logical value A pointer value An integer value A packed decimal value
    Explanation
    The correct data types for a CL variable include a logical value, a pointer value, an integer value, and a packed decimal value. These data types allow for different types of values to be stored and manipulated in a CL program.

    Rate this question:

  • 33. 

    An administrator needs to inform users that the system is about to be powered down, and ask if any user needs an additional 15 minutes to complete work in progress. The administrator entered "GO MANAGESYS" and selected Option 12-Work with Signed-On Users, but does not see the option to send a message to all signed on users. Why is the administrator unable to send the message to the users?

    • A.

      The administrator is not signed on to the console.

    • B.

      The administrator needs to press F24 to show more options.

    • C.

      The administrator does not have *IOSYSCFG special authority.

    • D.

      The administrator is using the intermediate assistance level.

    Correct Answer
    D. The administrator is using the intermediate assistance level.
    Explanation
    The administrator is unable to send the message to the users because they are using the intermediate assistance level. This level does not provide the option to send a message to all signed-on users.

    Rate this question:

  • 34. 

    What is a limitation of the IFS portion of a tape image catalog?

    • A.

      Images cannot be journaled.

    • B.

      Virus scan processing is blocked.

    • C.

      Images can grow to a maximum of 64GB.

    • D.

      Each catalog can have only 256 volumes added.

    Correct Answer
    D. Each catalog can have only 256 volumes added.
    Explanation
    The limitation of the IFS portion of a tape image catalog is that each catalog can have only 256 volumes added. This means that if there are more than 256 volumes to be added, multiple catalogs would need to be created, which can be inconvenient and time-consuming.

    Rate this question:

  • 35. 

    IBM i provides the capability to use digital certificates to sign objects. What objects, other than Programs (*PGM), Service programs (*SRVPGM) and Modules (*MODULE) may be signed?

    • A.

      Libraries (*LIB) SQL Packages (*SQLPKG)

    • B.

      Query definitions (*QRYDFN) Journals (*JRN)

    • C.

      Populated save files (TILE SAVF) Commands (*CMD)

    • D.

      Message queues (*MSGQ) Populated data Queues (*DTAQ)

    • E.

      Physical files (*FILE PF-DTA) User Profiles (*USRPRF)

    Correct Answer
    C. Populated save files (TILE SAVF) Commands (*CMD)
    Explanation
    IBM i provides the capability to use digital certificates to sign objects such as Programs, Service programs, and Modules. In addition to these, other objects that may be signed include Libraries, SQL Packages, Query definitions, Journals, Populated save files, Commands, Message queues, Populated data Queues, Physical files, and User Profiles. Therefore, the correct answer options are Populated save files and Commands.

    Rate this question:

  • 36. 

    A printer has jammed while in the middle of printing a large file. After clearing the jam, what is the next step or steps?

    • A.

      Restart the writer, specifying the starting page number.

    • B.

      Hold the spooled file on the output queue. Release the spooled file.

    • C.

      Hold the writer. Clear the printer buffer by turning the printer off and then on. Release the writer.

    • D.

      Hold the spooled file. Clear the printer buffer by turning the printer off and then on. Restart the writer, specifying the starting page number.

    Correct Answer
    A. Restart the writer, specifying the starting page number.
    Explanation
    After clearing the jam, the next step is to restart the writer, specifying the starting page number. This is necessary to ensure that the printing process resumes from the correct page and does not cause any disruption or confusion in the printed output. Holding the spooled file on the output queue or releasing it, holding the writer, and clearing the printer buffer by turning the printer off and then on are not mentioned as the next steps in the given context.

    Rate this question:

  • 37. 

    How does the "Save While Active" function work?

    • A.

      A checkpoint image of the object is made and saved to media.

    • B.

      It saves the entire object and uses the journal to reconstruct it at restore time.

    • C.

      It uses journaling to cache read and write requests for the saved object from other jobs.

    • D.

      An exit point program is used to manage temporary locks on the object by the save operation and any requesting jobs.

    Correct Answer
    A. A checkpoint image of the object is made and saved to media.
    Explanation
    The "Save While Active" function works by creating a checkpoint image of the object and saving it to media. This checkpoint image allows for the object to be restored at a later time.

    Rate this question:

  • 38. 

    An administrator needs to authorize an operator to SST so the operator can perform required job functions. What is needed to authorize the new operator to sign on to SST?

    • A.

      Create a user profile in SST/DST for the new operator.

    • B.

      Add 'SERVICE and *IOSYSCFG special authorities to the operator's user profile.

    • C.

      Grant the IBM i user profile access rights to SST by using QSECOFR in DST after an IPL.

    • D.

      Add the new operator to the QIWSADM iSeries Access Administrators authorization list and grant SST/DST privileges.

    Correct Answer
    A. Create a user profile in SST/DST for the new operator.
    Explanation
    To authorize the new operator to sign on to SST, the administrator needs to create a user profile in SST/DST for the new operator. This will allow the operator to have a unique login and access to the necessary job functions.

    Rate this question:

  • 39. 

    The number of jobs in a job queue is increasing. Jobs are running in the subsystem. What is a potential cause of this increase?

    • A.

      The active jobs in the subsystem are in *BCHHLD status.

    • B.

      The job queue has too Iowa sequence number in the subsystem.

    • C.

      The subsystem is set up to only run prestart and auto start jobs.

    • D.

      The maximum number of concurrent jobs for the subsystem has been reached.

    Correct Answer
    D. The maximum number of concurrent jobs for the subsystem has been reached.
    Explanation
    The increase in the number of jobs in the job queue can be attributed to the subsystem reaching its maximum number of concurrent jobs. Once the maximum limit is reached, any new jobs that are submitted to the subsystem will be added to the job queue instead of being immediately processed. This backlog of jobs in the queue leads to the increase in the number of jobs.

    Rate this question:

  • 40. 

    After restoring a file to LIBA schema, the administrator wants to display the contents of file using System i Navigator. After opening System i Navigator the administrator cannot see the LIBA schema. What will add the schema to the list of schemes?

    • A.

      Right-Click Databases and choose "Select Default Schemas."

    • B.

      Right-Click Schemas and choose "Select Schemas to Display."

    • C.

      Right-Click Database Maintenance and choose "Add Default Schemas."

    • D.

      Right-Click the name assigned to the relational DB (S101ff5c) and choose "Add Schemas to List."

    Correct Answer
    B. Right-Click Schemas and choose "Select Schemas to Display."
    Explanation
    Right-Click Schemas and choose "Select Schemas to Display" will add the LIBA schema to the list of schemas in System i Navigator. This option allows the administrator to select which schemas they want to see in the display, so by selecting the LIBA schema, it will be added to the list and become visible.

    Rate this question:

  • 41. 

    An administrator creates a new user profile and assigns that new profile to two groups, GROUP1 and GROUP2. GROUP1 has update authority for APP1 application. GROUP2 has only read authority to APP2 application. The new user is able to access APP1 and APP2 as expected. A month later the administrator needs to stop the user from updating APP1 and assigns the user to GROUP3, which only has read authority to APP1. However, the user can still update APP1. What is the most likely cause of this problem?

    • A.

      The administrator did not remove GROUP1 from the user profile.

    • B.

      The system was not restarted to make the group profile changes effective.

    • C.

      GROUP3 was not first in the list of group profiles to restrict update to APP1.

    • D.

      The administrator did not remove all of the Individual Authorities from the GROUP1 profile for that user.

    Correct Answer
    A. The administrator did not remove GROUP1 from the user profile.
    Explanation
    The most likely cause of the problem is that the administrator did not remove GROUP1 from the user profile. Since the user was initially assigned to GROUP1, which had update authority for APP1, the user still retains that authority even after being assigned to GROUP3, which only has read authority. To resolve the issue, the administrator should remove GROUP1 from the user profile to remove the update authority for APP1.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 30, 2012
    Quiz Created by
    Rafasol
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.